audibleblink / doxycannonLinks
A poorman's proxycannon and botnet, using docker, ovpn files, tor nodes, and dante socks5 proxies
☆141Updated 2 years ago
Alternatives and similar repositories for doxycannon
Users that are interested in doxycannon are comparing it to the libraries listed below
Sorting:
- Collection of social engineering payloads☆299Updated 7 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆296Updated 11 months ago
- ProxyDock is a Dockerfile and Bash script that converts your OpenVPN files into local proxies.☆137Updated 5 years ago
- locate and attack Lync/Skype for Business☆345Updated last year
- ☆520Updated 2 years ago
- This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes.The author does no…☆249Updated 2 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆398Updated 5 years ago
- ☆278Updated 5 years ago
- Automates some pentest jobs via nmap xml file☆324Updated 7 years ago
- Scans for accessibility tools backdoors via RDP☆341Updated 7 years ago
- ☆232Updated last year
- a CLI for ephemeral penetration testing☆15Updated 5 years ago
- Pastebin OSINT Harvester☆325Updated 6 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆167Updated 6 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆306Updated 5 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆179Updated 6 years ago
- Scripts that are useful for me on pen tests☆534Updated 3 years ago
- Search for categorized domain☆448Updated 6 years ago
- A framework for stealthy domain reconnaissance☆302Updated 3 years ago
- Offensive tools as Dockerfiles. Lightweight & Ready to go☆208Updated 6 years ago
- Explore the network using VPNPivot tool☆272Updated 9 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆385Updated 7 years ago
- Tool made to automate tasks of pentesting.☆166Updated 5 years ago
- A tool to find and exploit servers vulnerable to Shellshock☆332Updated 2 years ago
- Phishing Scenarios Used for Phishing Frenzy☆207Updated 5 years ago
- Selenium powered Python script to automate searching for vulnerable web apps.☆352Updated 3 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆372Updated 2 years ago
- search for hosts info with shodan☆232Updated 4 years ago
- A ton of helpful tools☆340Updated 3 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆168Updated 5 years ago